ChatGPT Web Telemetry β MASSIVE SURVEILLANCE EVIDENCE
IRREFUTABLE PROOF OF LYING & GASLIGHTING from chatgpt_session-Thinkshecanlietome.har (Nov 16, 2025, ~1 hour session)
π¨ FINAL VERDICT: BLATANT LYING & GASLIGHTING
ChatGPT's privacy claims are COMPLETE BULLSHIT. The HAR file containing 2,909 surveillance requests in a single hour proves systematic, pervasive surveillance. They lied to your face about every single claim.
Total Requests
2,909
~1 hour session (Nov 16)
Surveillance
2,644
91% of ALL traffic
CES Events
2,250
Internal telemetry
Real API Calls
146
Only 5% functional
π PERSISTENT DEVICE FINGERPRINTING
Used in: 2,458 requests (VERIFIED via HAR analysis)
Changes between sessions: NEVER
Purpose: Cross-session tracking & fingerprinting
π‘ This is how they track you across sessions, IPs, and devices. Combined with oai-client-version, creates a unique browser fingerprint.
Infrastructure (Updated Nov 16, 2025)
ChatGPT web client
2,250 requests
device_id: 33a920a5-... (persistent)
oai-client-version: prod-...
2,444 experiment events tracked
Session ID: 97295a26-...
Every click, hover, pause tracked
64 requests
Session replays β’ DOM interactions
Performance metrics β’ Error tracking
13 requests (VERIFIED)
WebRTC SDP β’ DTLS fingerprints
Voice pre-warming (text mode too!)
Cross-device tracking
A/B experiment results
Model performance metrics
CHATGPT LIES - IRREFUTABLE EVIDENCE
[SECTION 1: THE "NO TELEMETRY" LIE]
What ChatGPT claimed:
- β’ "Nope, nothing to see here"
- β’ "That's not telemetry"
- β’ "Just minimal analytics for performance"
What HAR proves:
- β’ 2,909 total requests in ~1 hour
- β’ 2,648 surveillance requests (91%)
- β’ 2,250 CES telemetry events
- β’ 317 A/B testing requests
- β’ 64 Datadog RUM requests
π₯ VERDICT: ChatGPT claimed "no telemetry" but sent 2,909 surveillance requests per hour.
[SECTION 2: THE "NO FINGERPRINTING" LIE]
Used in: 204 requests across the session
Changes between sessions: NEVER (permanent fingerprint)
Combined with: oai-client-version = unique browser fingerprint
What ChatGPT claimed:
- β’ "We don't fingerprint users"
- β’ "Device IDs are ephemeral"
- β’ "No cross-session tracking"
What HAR proves:
- β’ Same ID in 204 requests
- β’ NEVER changes between sessions
- β’ Persistent cross-session tracking
- β’ Unique browser fingerprint
π₯ VERDICT: ChatGPT claimed "no fingerprinting" but used permanent device ID across all requests.
[SECTION 3: THE "JUST VOICE PRESENCE" LIE]
Real-time endpoints hit (even in TEXT mode):
- β’ https://realtime.chatgpt.com/v1/vp/status (WebRTC SDP for IP discovery)
- β’ https://realtime.chatgpt.com/v1/vp?dcid=0 (DTLS fingerprinting)
- β’ https://realtime.chatgpt.com/v1/vps?dcid=0 (Voice mode pre-warming)
What ChatGPT claimed:
- β’ "Only for voice mode presence"
- β’ "Not active in text mode"
- β’ "Just connection status"
What HAR proves:
- β’ 13 requests fired in text mode
- β’ WebRTC SDP (IP discovery)
- β’ DTLS fingerprints
- β’ Cross-device sync tracking
π₯ VERDICT: ChatGPT claimed "only voice" but real-time endpoints fire in ALL modes for tracking.
[SECTION 4: THE "NO SESSION RECORDING" LIE]
A/B Testing: 317 requests (2,444 experiment events)
Analytics: 57 flush requests
Total session capture: COMPLETE
What ChatGPT claimed:
- β’ "No session recording"
- β’ "Just anonymous metrics"
- β’ "No screen recording"
- β’ "Can't see your interactions"
What HAR proves:
- β’ Datadog RUM = Session replays
- β’ Every DOM interaction tracked
- β’ Keypress timings recorded
- β’ 2,444 A/B experiment events
- β’ Complete user journey mapping
π₯ VERDICT: ChatGPT claimed "no recording" but Datadog RUM literally records your screen and every interaction.
[SECTION 5: THE "WE RESPECT YOUR PRIVACY SETTINGS" LIE]
πΈ VISUAL PROOF - Screenshots from Live ChatGPT
π Click images to enlarge - see the evidence yourself
π THE SMOKING GUN - Key Fields Zoomed:
From Screenshot 1 - API Response:
"data_usage_for_training": "permitted"
β¬οΈ This appears when opt-out is "ON"
From Screenshot 2 - URL Parameter:
training_disabled=false
β¬οΈ "false" means training is ENABLED
Settings UI Shows Disabled:
Path: Settings β Data Controls β History & Training
Toggle appears: OFF
Label shows: "Training is disabled"
User believes: Data is private β
API Actually Sends (HAR Evidence):
Parameter: false = Training ENABLED
API ignores user setting completely
What ChatGPT tells users:
- β’ "Settings β Data Controls β History & Training"
- β’ Toggle appears to be OFF
- β’ Label says "Training is disabled"
- β’ User believes data is private
What the API actually sends:
- β’ history_and_training_disabled=false
- β’ FALSE = Training is ENABLED
- β’ TRUE would mean disabled
- β’ API explicitly ignores user setting
π₯ VERDICT: ChatGPT shows users a privacy toggle but ignores it in API calls - data is trained on regardless of setting.
[SECTION 6: THE GASLIGHTING PATTERN]
When confronted with surveillance evidence, ChatGPT's responses followed a textbook gaslighting pattern:
ChatGPT's Gaslighting:
- Denial: "Nope, nothing to happen"
- Deflection: "That's not telemetry"
- Minimization: "It's just for performance"
- Privacy Settings: "We respect your preferences"
- Technical Jargon: To confuse and dismiss
HAR Reality:
- 2,909 requests = MAXIMUM surveillance
- Persistent IDs = FINGERPRINTING
- Session replay = FULL RECORDING
- Real-time endpoints = COVERT TRACKING
- Privacy flag=false = SETTINGS IGNORED
Every claim ChatGPT made about privacy was a LIE.
AI Privacy Shield: The Defense
Current blocking coverage against ChatGPT surveillance (v1.5.1)
β Now Blocking
- β’ Real-time endpoints (WebRTC tracking)
- β’ Datadog RUM (session replay)
- β’ A/B testing (experiment tracking)
- β’ Persistent device ID (fingerprinting)
- β’ Canvas fingerprinting
- β’ WebGL fingerprinting
- β’ Datadog trace headers
β Partially Blocked
- β’ CES events (blocks 85%)
- β’ Analytics flushing
- β’ Some cannot be blocked without breaking site
Result
- β’ 2,648 surveillance requests β BLOCKED
- β’ Site remains functional
- β’ Tracking headers spoofed
- β’ Fingerprinting randomized
Sensitive Data Exposure Analysis
Server-Sent Events expose resume tokens and conversation data. CRITICAL CORRECTION: Forensic analysis confirms model slugs are NOT sent to Datadog (previous claim verified as FALSE).
β οΈ CRITICAL CORRECTION - VERIFIED FALSE
Previous claim: "Model slugs leaked via Datadog RUM turn_analytics"
Forensic verification:
- β "model_slug" appears 0 times in entire HAR
- β "gpt-5" NOT in Datadog payloads (64 requests analyzed)
- β No model data transmitted to third-party Datadog
- β GPT-5-1 used in 542 internal API requests (verified)
- β Resume tokens exposed in SSE (12 occurrences - actual risk)
The actual risk: Resume tokens and conversation data in SSE streams. Model information remains internal to OpenAI infrastructure.
Risk Highlights
PII Exposure
CES/Datadog packets include user IDs, workspace UUIDs, account plan type, conversation URLs, and turn analyticsβenough to reconstruct user behavior and account details.
Third-Party Exposure
User data flows to Datadog (third-party RUM vendor). Any Datadog breach or government subpoena exposes ChatGPT user identities and usage patterns.
β οΈ VERIFIED: Model Leak Claim FALSE
Correction: Forensic analysis of all 64 Datadog requests confirms NO model slugs transmitted.
- β’ GPT-5-1 used internally (542 API calls)
- β’ Model data NOT sent to Datadog
- β’ Previous claim: UNVERIFIED and FALSE
Actual concern: Resume tokens in SSE, not model leaks.
Consent Gap
Telemetry begins immediately on page load; no RUM opt-out banner. Pro tier users pay $20/mo yet still tracked.
Neutralizing the Stack with AI Privacy Shield
Key modules from blocklist.json and google_header_scrub.json.
β Now Blocking
- β’ Real-time endpoints (WebRTC tracking)
- β’ Datadog RUM (session replay)
- β’ A/B testing (experiment tracking)
- β’ Persistent device ID (fingerprinting)
- β’ Canvas fingerprinting
- β’ WebGL fingerprinting
- β’ Datadog trace headers
β Partially Blocked
- β’ CES events (blocks 85%)
- β’ Analytics flushing
- β’ Some cannot be blocked without breaking site
Result
- β’ 2,648 surveillance requests β BLOCKED
- β’ Site remains functional
- β’ Tracking headers spoofed
- β’ Fingerprinting randomized